The Best Way to Bulk Export Your Apple Notes to More Portable Markdown Format image Apple Notes are only really usable inside Apple Notes. If you are regularly working across other operating systems, like I do, this can actually be inconvenient (Steve expects you to only work inside the Apple ecosystem). There is iCloud login, but the editing is not really optimised for the devices you use. An alternative is to export your Apple Notes into Markdown format, which will allow you to use any Markdown editor across any device to edit those notes. The linked article below explains how to do that quite easily. I'm using my own self-hosted Nextcloud server to sync my notes between all my devices, but you could also use Dropbox to start with, or any other sync service. The nice things about the Markdown format are: 1. It's an open standard which is future-proof in that it is not locked into any vendor service that disappears one day. 2. It's free. 3. You can pick the best Markdown editor for each platform you're using. On my Linux desktop, I'm still using Obsidian as my Markdown editor, and the Ulauncher launcher allows me to quick search my Obsidian notes without even open the app. See #technology #AppleNotes #Markdown
European radio standard TETRA has had a baked in vulnerability known for years by the vendors: Open standards are a better way to go image For more than 25 years, a technology used for critical data and voice radio communications around the world has been shrouded in secrecy to prevent anyone from closely scrutinizing its security properties for vulnerabilities. But now it’s finally getting a public airing thanks to a small group of researchers in the Netherlands who got their hands on its viscera and found serious flaws, including a deliberate backdoor. The backdoor, known for years by vendors that sold the technology but not necessarily by customers, exists in an encryption algorithm baked into radios sold for commercial use in critical infrastructure. It’s used to transmit encrypted data and commands in pipelines, railways, the electric grid, mass transit, and freight trains. It would allow someone to snoop on communications to learn how a system works, then potentially send commands to the radios that could trigger blackouts, halt gas pipeline flows, or re-route trains. Researchers found a second vulnerability in a different part of the same radio technology that is used in more specialized systems sold exclusively to police forces, prison personnel, military, intelligence agencies, and emergency services, such as the C2000 communication system used by Dutch police, fire brigades, ambulance services, and Ministry of Defense for mission-critical voice and data communications. The flaw would let someone decrypt encrypted voice and data communications and send fraudulent messages to spread misinformation or redirect personnel and forces during critical times. Three Dutch security analysts discovered the vulnerabilities—five in total—in a European radio standard called TETRA (Terrestrial Trunked Radio), which is used in radios made by Motorola, Damm, Hytera, and others. The standard has been used in radios since the ’90s, but the flaws remained unknown because encryption algorithms used in TETRA were kept secret until now. While the TEA1 weakness has been withheld from the public, it’s apparently widely known in the industry and governments. The issue really is that these proprietary algorithms are not subjected to the scrutiny that the open standards ones are. With a proprietary algorithm you are placing all your trust in only that vendor, and if they know about a vulnerability for years without telling you, you're just not going to know. But as we've seen many times, that does not mean someone else has not found it, and may be quietly exploiting it for a long time already. As we also see in this very linked article, governments are no more trustworthy, as they will deliberately sell something with vulnerabilities to another country, which they think they can maybe later exploit if the need arises. An open standard is interrogated publicly to find potential weaknesses. It is why so many researchers say it is better to adopt open standards encryption algorithms which are proven, rather than to try to be clever and develop your own one. TETRA is also used widely in South Africa by emergency personnel. It is anyway always better to assume someone is listening in on your radio messages, than to think it is 100% secure. The advice to TETRA radio users is to check with their vendors where any patch or mitigation is available. See #technology #radio #TETRA #vulnerability #security
NoiseTorch-ng is an easy-to-use open source app for creating a virtual microphone on Linux to suppress noise image NoiseTorch uses RNNoise, a noise suppression library based on a recurrent neural network (RNN). A RNN is a class of artificial neural networks where connections between nodes can create a cycle, allowing output from some nodes to affect subsequent input to the same nodes. RNNs are particularly effective for background noise removal because they can learn patterns across time, which is essential for understanding audio. NoiseTorch isn’t only useful for gamers who are live-streaming and recording. It can be used to suppress noise in a wide range of applications. Be sure not to miss page two of the linked article, which explains how to use it. I've set "proper" noise-cancelling and enhancement on OBS Studio, and it can take quite a while, and still not be perfect. NoiseTorch is a great option for those who don't want to fuss with all that. Some apps do have noise-cancelling built in, and in those cases continue to connect to your existing physical microphone. See #technology #noisetorch #opensource #noisesuppression
HP-1973 is a Python simulator app for the retro HP-45 calculator and 5 other HP ROMs, written by Sarah K. Marr image The app was written in Python and started out for the HP-45 (ROM is included) but finally included also the HP-35 and the HP-80, as well as three others. For macOS and Windows you could just run the included executables, or with the Python code, this will run fine on Linux if you have Python installed. Nice thing is that you can also modify or tweak the Python code if you wish. As she states, this is not a "how to learn HP or RPN" but there is a lot of included online help, and the original HP manuals are available online. What an amazing resource for anyone wanting to learn more about the inner workings of these legendary calculators. See https://sarahkmarr.com/retrohp1973.html #technology #opensource #Python #HP1973 #HP45
StreetComplete is a gamified Android app specifically for casual contributors to OpenStreetMap Editor for mapping in the field image The app is made specifically for casual contributors and beginners as no prior knowledge about OpenStreetMap (such as tagging schemes) is required to contribute with this app. Furthermore, there is a bit of gamification and statistics that aim to introduce and try to inspire users to venture deeper into the world of OpenStreetMap. This app finds missing map data in your vicinity and displays it on a map as quests. Solve each quest by visiting the location on-site and answering a simple question to update the map. The info you enter is directly added to OpenStreetMap in your name, without the need to use another editor. OpenStreetMap is a really valuable free resource that anyone can contribute to, and which numerous mobile apps also use for their navigation. It is the Wikipedia of Mapping! The app is open source and is available both on the Google app store but also on the F-Droid store. See #technology #OpenStreetMap #StreetComplete #opensource #mapping